State the list of protocols supported by the intranet, Computer Networking

Assignment Help:

State the list of protocols supported by the Intranet

The following is the list of protocols supported by the Intranet:

  • ARP: Address resolution Protocol is used to resolve the hardware address of a card to package the Ethernet data. It works at the data link layer.
  • TCP: Transmission Control protocol is a connection oriented reliable protocol working at the transport layer.
  • IP: Internet Protocol. The IP part of TCP/IP; the protocol that is used to route a data packet from its source to its destination over the Internet.
  • FTP: File Transmission Protocol is a TCP/IP protocol running at the application layer.
  • TELNET:An Internet communications protocol that enables a computer to function as a terminal working from a remote available at the application layer.

(According to web reference TELNET derived from Telephone NETwork).

  • HTTP: Hypertext Transmission Protocol is the protocol used to communicate between web servers and web browser software clients.
  • SPX: Sequenced Packet Exchange operates at the transport layer providing connection-oriented communication on top of IPX etc.

 


Related Discussions:- State the list of protocols supported by the intranet

What is ipv6, What is IPv6? IPv6, or Internet Protocol version 6, was d...

What is IPv6? IPv6, or Internet Protocol version 6, was developed to change IPv4. At present, IPv4 is being used to control internet traffic, butis expected to get saturated in

Torus, Torus The mesh network with enclose around connections is called...

Torus The mesh network with enclose around connections is called Tours Network.

What is star topology, What is Star topology Each station is directly c...

What is Star topology Each station is directly connected to a common central node. Typically, each station attaches to a central node via two point-to-point links, one for tran

Firewall rules based on a fictitious organisation, Question 1 requires you ...

Question 1 requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption t

Why is the authentication and key agreement of 3gpp weak, Question 1: a...

Question 1: a) How is the four-way exchange employed for mutual authentication in WPA/RSN? b) Elaborate on how inquiry attacks and traffic monitoring attacks can be u

ICT, state the advantages of the ICT

state the advantages of the ICT

What is the virtual path, Along any transmission path from a given source t...

Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is known as path.

Show the steps used at sender end by check sum, Q. Show the steps used at s...

Q. Show the steps used at sender end by check sum? The sender follows these steps: The data unit is divided into "k" sections, each off "n" bits All sections ar

Random effects, Random effects are the effects attributable to an infinite...

Random effects are the effects attributable to an infinite set of levels of the factor, of which only the random sample occur in the data. For example, the investigator may want t

Deadlock avoidance or prevention, Deadlock Avoidance To avoid deadlock...

Deadlock Avoidance To avoid deadlocks two types of strategies are used: 1) Static prevention: It uses V and P operators and Semaphores to allocate and deallocate shared res

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd